RSS

Tag Archives: BYOD-Policy

SID2017: Safer Internet Day 2017-Participation

SID2017: Safer Internet Day 2017-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2017 – Save the date!.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2017 will be celebrated on Tuesday 07 February 2017, with the strapline of ===> „Be the change: unite for a better internet“ <=== following the success of last year’s campaign.

.

sid-gif

Click the animated image please to access the article.

 

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2017

programmerman-animatedWHAT is special this year with my participation on SID2017

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2017 in Luxembourg/Europe.

.

Click the image please to access the article.

 

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2017 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2017 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2017 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

 

Advertisement
 
Leave a comment

Posted by on January 30, 2017 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Analyzing, Apps, Autodidact, Awareness, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Big Data, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Collaborative Learning, Collective Intelligence, Comics, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Criticism, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Device Theft, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Emotional Intelligence, Encryption, Engagement, Entrepreneurship, EQ, eSkills, Ethical Mind, ethics, Europe, FAQ, Feedback, Free courses, Get smart with 5 minutes tutorials, Global, Global Collaboration, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learn with books, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Mobile Botnet, Mobile Security, Modern EDU, Naivety, Not ONLY rights but also responsibilities, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Seniors, SID2017, Skills, Smart TV's, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, TOR-Anonymat, Tracing, Tutorials, understanding, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Getting ready for Modern-EDUcation: FIRST try to understand WHAT it is

Getting ready for Modern-EDUcation: FIRST try to understand WHAT it is

.

Evolution of Education: Wordle Logo

.


Modern-EDUcation: FIRST try to understand WHAT it is before taking the wrong path!

programmerman-animatedLet us be honest: EDUcation is far behind of WHAT it should be able to face the challenges of a modern world which is evolving quicker than WE can follow! Because of ICT everything is nearly possible: NEW professions are emerging through NEW ideas; Entrepreneurship is one of the biggest evolving one. One can’t count anymore the possibilities, nor predict WHAT will be next professions! SO, WHAT does this mean for EDUcation!?

EDUcation can’t follow, nor adapt THAT quickly, without talking about the minds behind WHO don’t want to change as well!!! SO, is there any possibility for students, learners, THEY could be benefiting with and/for an Up-To-Date knowledge!? YES, there is a solution: students and learners should get taught about <===> LEARNing-To-LEARN <===> so that they would be able for <===> Life-Long LEARNing, this is THE BEST way to look for a <===> Long-Term solution <===> as one can’t get ALL the necessary knowledge anymore in schools!!

Please read:

WE should go on <===> Proactive THINKing <===> to adjust this well known situation and to adapt by teaching the students learners the way of <===> Learning-To-Learn <===> and to encourage them to become autodidacts, self-directed learners! That’s THE BEST way for them to stay <===> Up-To-Date <===> and that’s WHAT is counting in a modern and ever growing society! The workforce/industry needs this to be competitive! 


FIRST of all WE need to know WHAT are the skills students need to have

.

what-skills-will-you-need-to-succeed-in-the-future_5061e259a60b6_w587

.

There is a Windows dominance on the market!!! SO, don’t use ONLY Apple products in your school, BUT make for sure that YOUR LEARNers, Students will know and have the skills to work on that “OS”; of course you might use as well iPads! BUT make sure that there is a mix of different “OS” anyway. As educational persons WE have a BIG Responsibility to prepare OUR Students, LEARNers for the future! NO Cherry-Picking allowed!!! NO preferences for #AnyOS #AnyDevice!!! A mixture of THEM YES, orientated about WHAT “OS” is leading the market.

Learn more:

 

Concerning Smartphones:

With the above mentioned, please look at the PIC below, as well as my curation about Metacognition and Soft-Skills which are a MUST in 21st Century:

.

Synthesizing Mind-5 Minds for the future

.

Learn more:

Consider as well, please, Andragogy UP from 11 years old, check my blog post below:

AND with the above mentioned necessary skills, NOTHING works without Social-Media, check below please:

 

.

Learn more

..Learn more:

.

teaching-to-the-human-core-2016-sketchnote

Please click on the image to access the article

.

.


How can EDUcators TEACHers and EDU understand WHAT Modern EDU is!?

change-gartner-2016Well, there are some really good books which will help EDUcators TEACHers to understand WHAT Modern-EDU and NEW pedagogy is to be prepared for THE CHANGE; YES it is a BIG CHANGE which might not be easy for lots as THE role of the EDUcators TEACHers will change; NOT having anymore the control, the power, of a classroom BUT being a coach WHO is trying to get a win-win situation TOGETHER with the learners, students. Personally I think that fearing to lose the control and power is the common point for most educating persons for NOT adapting to Modern-EDU!

BUT, THAT is wrong! You will get even more recognized and respected WHEN you play the coach role; my experience over ten (10) years. Put the students in the drivers seat, let them teach also and learn also from them 😉

SO, read FIRST my selection of books, which helped ME to understand about Modern-EDU and where that acquired knowledge led me, please:

.

MUST READ BOOKS

.

For BEST understanding I recommend to YOU to start first with “5 Minds for the Future“, followed by “FOUR-DIMENSIONAL EDUCATION” and then “The App Generation“.

If YOU are multilingual (English, French, German), you might read as well my books selection which I have read and which helped me a lot:

.

Check about WHAT the book “5 Minds for the Future” is:

.

Synthesizing Mind-5 Minds for the future

.

Linear learning was YESTERDAY; imagine learning <===> time, too long to catch up when only A, then B, Then C… Check AGAIN the PIC above, please 😉

Time is ALSO a very IMPORTANT part of Modern-EDU to adjust for quicker learning WHEN knowing about “TEAM-TEACHing“, called ALSO “Co-TEACHing” and the How-To about making learning really meaningful and professional, check below, please:

.


What are the barriers to overcome for that THE CHANGE happens? Obstacles to make the next steps to Modern-EDU

.

1ibdy1vf6wghd-n05dgl-aigainformation1Without a lot of talking myself, I invite you to read the following articles which explain  at its BEST:

.

Quote from [https://twitter.com/kimgarst] “If you don’t leave your past in the past, it WILL destroy your future. Live for what today has to offer, not for what yesterday has taken away.

You have to fight against OTHERS who are NOT wanting THE CHANGE, the “StatusQuo” advocates, make curation WHERE you will curate the necessary arguments to convince and/or beat them with their OWN arguments!!

.

.

Listening, very important:

.


How to become GREAT Teachers, EDUcators which understand about Modern-EDU?

mediocrity-reward-nice-talking.

There are TOO MANY average (Mediocrity) EDUcators TEACHers around, Students and LEARNers need BETTER!!! Educational persons SHOULD read the below curated articles and finding out on WHAT they have to improve, please 😉

 


Coaches and/or mentors are a MUST

programmerman-animatedAs already mentioned in my first phrases of this blog post, with normal training for “Professional Development”, YOU can’t catch UP quickly enough!! SO, are there different ways? YES, by using Social Media, especially Twitter YOU can create a #PLN, a “Personal [Professional] Learning Network” from where YOU can learn already together, even ALSO by using Twitter Chats.

Learn more:

BUT there is ALSO another way: using blogs! Sounds strange? Well, with “WordPress” this is possible as YOU can invite co-authors on the same blog post and coaching over Twitter with “DM” (Direct Messages, called ALSO Private Messages) YOUR co-authors. I do this already since 2007-2008, started it on “Google Knol”, who was discontinued on May 1, 2012 where  I was one of the Knol-TOP10-English authors and also Author-of-the-Week in November 2009 with more than 1.4 millions of visits. “Google Knol” is one of LOTS of OTHER products from Google WHO are on the “Google Grave Yard“!

.

Gust MEES-Knol-Author-Of-The-Week-2009

.

Later I started blogging on WordPress and as I missed it working together with OTHERS, I did my coaching with EDUcators, TEACHers from different countries by inviting THEM to become co-authors on some of my blog posts. I was the editor and THEY were the co-authors, meaning they had a bit restrictions ONLY on WHAT to do with the main blog. SO, THEY learned about the How-To to use blogs (WordPress) through my coaching and ALSO about THE TOPIC WE were writing about; the coaching was done through Twitter “DM’s”; WE used blogs AND Twitter!

I did a LOT of those “Global-Collaboration” on blogging with different co-authors and I encourage everybody to do the same as it is a GREAT experience as one learns from each other 😉

Learn more:

Tips for using WordPress:

 

 


WHAT could be done different while using ICT and NEW Pedagogy

programmerman2.

Well, that is a question I get asked very often; it is actually NOT that difficult, it just needs to understand WHAT Modern-EDU is and WHAT are THE tools (NO, NO, NOT Apps…, THEY are ONLY facilitators) WE can use to give OUR Students, LEARNers the necessary skills to survive in an ever changing world.

.

Check below, please:

Check out my Learning-Path with ICT Practice to get the idea about it, please:

SO many information, THE letter “I” in ICT, I can’t follow anymore!! Well, I can understand YOU, BUT there is a solution for it! 😉 Through curation and Social-Media (by creating a PLN on Twitter…) YOU can create a <===> Personal [Professional] Knowledge Management (PKM), check my blog post below please: PKM – Personal [Professional] Knowledge Management:


And WHAT Is About Creativity!?

Let us start with a video from <===> Sir Ken ROBINSON <===>, please listen to it. Sir Ken Robinson makes an entertaining and profoundly moving case for creating an education system that nurtures (rather than undermines) creativity.

.

.

There is actually a BIG move to creativity in EDUcation worldwide, e.g. <===> THE Maker-Movement; please check below for more information:

.


WHAT will influence EDUcation in the future!?

Is there something which one can predict, without being a wizard!? YES; for sure as persons WHO read constantly on each day WHAT is NEW on technology and science as well as research papers one can say this, see below, please:

.


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog post(s) 😉

.

 

Keywords necessary for me to write this blog post: Social Media, Twitter, books, reading, understanding, Twitter Chats, Growth Mindset, stubborn, thinking with an old Mindset for Modern-EDU doesn’t work!, 21st Century, Pedagogy FIRST, EdTech as facilitators, BEST APP EVER PIC, YOU can’t solve problems on the same way as they were created, Einstein, quotes Gust, GREAT TEACHers, Professional EDUcators TEACHers, Videos, Following THE WRONG people, collection of quotes images as Gallery, 21st Century skills for students infographic, Microsoft leader NOT Apple, Collaborative Learning, collaboration, Global-Collaboration, Curation, blogs, blogging, PLN, PKM, NO Cherry-Picking!, Life-Long Learning, Learning-To-Learn, NOT ONLY CONSUMER!!, Critical THINKing, Proactive THINKing, PBL, SOFT SKILLS, Luxembourg EDUcation Strategy, Windows dominance in the working market, Metacognition,

.

.

 

 

.

 
Leave a comment

Posted by on November 1, 2016 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Analyzing, Andragogy, Apps, Augmented Reality, Autodidact, Awareness, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), BYOD, Co-Teaching, Coaching, Collaboration, Collaborative Learning, Collective Intelligence, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Curation, Curriculum, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Intelligence, DQ, Education, Education 4.0, eLeadership, eLearning, Emotional Intelligence, Engagement, EQ, eSkills, Ethical Mind, ethics, Europe, Flipped Classroom, Flipped Learning, Free courses, Future Work Skills, Games, Gamification, Global Collaboration, Holistic view of EDUcation in the future, How To stay organized, HowTo, Innovation, Key Instructors, Leadership, Learn with books, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning By Doing, Learning to Learn, Luxembourg, MakerSpace, Mixed Reality, Modern EDU, Motivation, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), Personalized Learning, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Project Based Learning, QR, QR-Code, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Self-directed Learning, Seniors, Sir Ken ROBINSON, Skills, Social Media, Student Centred, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Team-Teaching, Technology Integration, ThingLink, Twitter, Twitter Chat, Understanding the internet, Virtual Reality, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2016: Safer Internet Day 2016-Participation

SID2016: Safer Internet Day 2016-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2016 – Save the date!

.

SID16-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2016 starts to take shape.

.

SID2016-Poster

.

 

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2016

programmerman-animatedWHAT is special this year with my participation on SID2016

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2016 in Luxembourg/Europe.

.

BEESECURE-SID-Gust MEES-18-01-2016

.Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2016 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
Leave a comment

Posted by on January 18, 2016 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Analyzing, Andragogy, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Autodidact, Awareness, Backdoors, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Device Theft, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, European Cyber Security Month, Facebook, FAQ, Feedback, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Interviews, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Motivation, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, PC Cleaning, PC Maintenance, Personal Learning Network (PLN), Personal profit, Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Project Based Learning, PUPs, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Self-directed Learning, Seniors, SID2016, Skills, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Team-Teaching, Technology Integration, Third Party Applications, Tracing, TU-DRESDEN, Twitter, Twitter Chat, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

.

Learning basics of IT-Security and Cyber-Security

.


CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

We are ALL responsible for the internet

.

Internet safety is the responsibility of EVERYONE! It isn’t actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes… Let us call them <===> CyberHygiene <===> as they are about care anyway.

WHAT do WE have to take care about!? Check below please:

.

 

  • Updates about our “Operating System” (OS)
  • Updates about so-called “Third Party Programs”
  • Back-up from our files and/or the whole Hard Disk
  • Installation of protection-software, anti-malware, anti-spyware tools included…
  • Protection of our privacy
  • Encryption
  • Secure Passwords

MOST of the above mentioned are automated tasks, SO NO way to NOT use THEM 😉 GET used to IT! GET the reflexes!

For more in depth knowledge, check below please (more theory):

Check ALSO about the How-To from the EU (Europe):

.

eSkills map_0

Click the above image please to access the article.

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

Learn more:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Keywords necessary for me to create this blog post: eSkills, eCitizen, #digcit, EU, Europe, 21st Century LEARNing, collaboration, lifelong LEARNing, learning to learn, coaching, accelerated learning, le mieux apprendre, time management, tagboard, curation, PLN, PKM, Social Media, Twitter, catalyst, amplifier, Modern Edu, Twitter Chat’s, Social Media, curation, blogging, Multimedia, LEARNing To LEARN, Life-Long LEARNing, PLN, PKM, Twitter, Updates, third party applications, BYOD, malware, botnets, mobile security, CyberSecurity, community feeling, community responsibility,

Stay tuned for next blog posts 😉

 

.

.

 

 
Leave a comment

Posted by on December 20, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Andragogy, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Autodidact, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, Free courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, HowTo, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Self-directed Learning, Seniors, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Let Us Talk About eSkills. | WHAT Is It?

Let Us Talk About eSkills. | WHAT Is It?

.

Evolution of Education: Wordle Logo

.


WHAT Is eSkills? WHY Does The “e” Stand Before?

Manifesto: get an overview of challenges & opportunities outlined by experts .

[Start text from the MANIFESTO 2015] Much has been written about the digital skills gap and whether Europe is falling behind in the race for digital talent. After some spectacular declines in ICT education enrollments and graduate numbers in the first years of the new millennium, the European Commission developed a long-term e-skills strategy to reverse the worrying trend. Now, and since 2010, the number of ICT students is growing again. The good news today is that there are signs that the rate of growth is quicker than expected. [END text from the MANIFESTO 2015].

eSkills map_0

Click the above image please to access the article

 

Related articles:

Check ALSO on Social Media Twitter <===> #eSkills


WHAT else is important on a holistic and proactive view to reach a professional way for eSkills?

Check below please:

.

 

programmerman-animated

Internet of Things (in DE, FR, EN):
 .
.
.
My Infographics recommandations:
.
ICT SKILLS (eSkills / eLeaderShip / digcit / Digital Citizenship), multilingual:
.
 programmerman2

 

 .
Cybermobbing / CyberBullying
.
Please check my curation (Infographics included) articles (in DE, FR, EN):
.
.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Keywords necessary for me to create this blog post: eSkills, eCitizen, #digcit, EU, Europe, 21st Century LEARNing, collaboration, lifelong LEARNing, learning to learn, coaching, accelerated learning, le mieux apprendre, time management, tagboard, curation, PLN, PKM, Social Media, Twitter,

Stay tuned for next blog posts 😉

.

.

 

 
7 Comments

Posted by on December 18, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Andragogy, Annotum-Theme, Autodidact, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Engagement, eSkills, Ethical Mind, Europe, Facebook, FAQ, Feedback, Free courses, FREE-courses, Future Work Skills, Get smart with 5 minutes tutorials, Global, Global Collaboration, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, itsecurity, Key Instructors, Learn with videos, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Self-directed Learning, Seniors, Skills, Social Media, Student Centred, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Team-Teaching, Technology Integration, Twitter, Understanding the internet

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WHAT Are THE Skills Needed From Students In The Future!?

WHAT Are THE Skills Needed From Students In The Future!?

.

LOGO-Gust MEES-2015-Professional-Development-My Way

.


WHAT Are THE Skills Needed From Students In The Future!? OR, WHAT Are THE Jobs Look Like In The Future!?

That are actually questions which I get asked very often from people and where I could ask ONLY the first one! WHAT Are THE Skills Needed From Students In The Future!? Well, there is one well renown person WHO explains it BEST in my opinion, and that is Howard GARDNER. Please check the picture below to understand.

.

Synthesizing Mind-5 Minds for the future

.

When YOU have a closer look than YOU will realize that the <===> Synthesizing Mind <===> is THE major skill needed! I use it since ages in my courses and with a big success! Actually ALL my blogs and blog posts are based on it.

.

what-skills-will-you-need-to-succeed-in-the-future_5061e259a60b6_w587

Click the above image,please, to access the article.

.


HOW Can WE Create OUR Courses Based On The Synthesizing Mind!?

Please check my Flowcharts below:

.

PracTICE-21st-Century-Assessment-Flowchart-Page1-screenshot

Click the above image, please, to access the article.

 

.

PracTICE-21st-Century-Assessment-Flowchart-Page2-screenshot

Click the above image, please, to access the article.

 

.

PracTICE-21st-Century-Assessment-Flowchart-Page3-screenshot

Click the above image, please, to access the article.

 

programmerman-animatedFacts to consider and advice:

YOU SHOULD explain that to YOUR LEARNers by designing the courses and tell THEM that they shouldn’t fear, that they should tell YOU when being in trouble, YOU should tell them that YOU take ALL the necessary time so that THEY will understand it, YOU should encourage them at any moment so that they will find the pleasure to LEARN 😉 YOU SHOULD use Empathy, observing them and find out WHO are those who are shy; the ones WHO won’t tell you when there is a problem. YOU SHOULD interact with them, looking over their shoulders and finding out WHERE the problem is.

That is the hardest part BUT the MOST IMPORTANT one as when they understood that they could find confidence in YOU, then they will advance in their LEARNing, THEY NEED confidence in YOU and in THEMSELVES!

Thus meaning: make the LEARNing individual! Take care of each person till they have understood it. It is like <===> differentiated instruction <===> EDUcation, BUT more coaching than teaching. In one phrase, differentiated instruction is primarily suiting instructional means to meet individual learning needs.

YOU can download the 3 pdf’s merged together here <===> 3 PDF’s-document_fusionne

.

The above mentioned could get updated by more actually, such as: collaboration, coaching, TEAMTEACHing, etc. for 21st Century Skills (left hand bottom). In upper-right corner YOU could add as well: videos, animations, comics, Skype, Webquests, etc.

Learn more:

.

Learn more from my previous posts <===> Design The Learning Of YOUR Learners, Students | Ideas and from <===> PracTICE examples <===> https://gustmees.wordpress.com/?s=PracTICE <===.

.


How Are Leading Countries In EDUcation Implement This!?

Well, when WE talk about leading countries in EDUcation MOST think certainly about Finland in Europe, which is true! BUT, there are ALSO other countries worth to have a look on it and to learn from them, as well as Luxembourg in Europe who is starting its NEW EDUReform in September 2015! I will present YOU my favorites below from WHOM I learned a lot online:

Let us talk ALSO about the initiative of the European Commission <===> eSkills For Jobs 2015 <===> Learn more:

Check out ALSO YOUR competencies by trying the below quiz:

.

 

Skillage-eSkillsForJobs2015

Click the above image, please, to access the article.

 

.


 THE Newcomer Luxembourg In Europe

Luxembourg WHO wants to build on as being THE country for ICT related companies made BIG efforts and is on its GOOD way to realize this as finally it has done its EDUReform WHO fits these needs, check below please.

.

Digital 4 EDUcation-Luxembourg-2015

Click the above image, please, to access the website.

 

 

.


WHAT Are THE Jobs Look Like In The Future!?

Well, there is certainly no one WHO could answer that question! One can ONLY speculate about it: there will certainly be a lot of jobs who will be created because of Social Media, Internet of Things and Cyber Security; some certainly also from the MakerED industry an I guess that (my prediction) that the Cyber Hygiene sector would become the future jobs market as well! WHY in Cyber Hygiene!? WHAT is Cyber Hygiene anyway!?

As Cybercrime as also Cyberespionage, so as privacy problems will certainly NOT going away, it is important if not a MUST that the employees of companies are well trained about those risks! There is certainly a big market in training employees.

Learn more:

 

.

CyberHygiene

Click the above image, please, to access the article.

 

.

DON’T take apart Privacy, Internet Safety AND Cyber Security as THEY are part of a WHOLE, called <===> Digital CitiZENship <===> Learning To Learn!

.

Tweet: DON’T take apart #Privacy #InternetSafety #CyberSurity as THEY ARE part of a WHOLE, called <==> #DigitalCitiZENship <==>!!! #LEARNing2LEARN

 

Learn more about the jobs of the future below, please:

.


 

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog post(s) 😉

 

Keywords necessary for me to create this blog post (preparation / brain storming): eSkills, eLeadership, Howard GARDNER, Synthesizing Mind, Community Manager, Social Media, jobs related to Social Media, programmer, ICT Cyber Security specialists, Apps programmers, designing courses, blogging, blogs, curation,

.

 
25 Comments

Posted by on May 26, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Andragogy, Annotum-Theme, Autodidact, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Comics, Competency, Connected Educators, Copyright, Creating Mind, Creativity, Critical Thinking, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, cybersecurity, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, eSkills For Jobs 2015, Ethical Mind, Europe, Facebook, Feedback, Free courses, Future Work Skills, Global Collaboration, HowTo, ICT Awareness, Internet Of Things, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Motivation, Naivety, Not ONLY rights but also responsibilities, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Searching, Self-directed Learning, Seniors, Skills, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Synthesizing Mind, Team-Teaching, Technology Integration, Tracing, Twitter, Updates, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Facts To Convince Someone For THE MUST Of LEARNing Basics Of CyberSecurity | Digital CitizenShip

Facts To Convince Someone For THE MUST Of LEARNing Basics Of CyberSecurity | Digital CitizenShip

.

 

We are ALL responsible for the internet

 Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Visual Walk On The Internet

programmerman-animatedLet us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer, Smartphones, tablets through YOUR browser…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

EDUcation and Schools RESPONSIBILITY: a safe place for the LEARNers, students! Because of the internet there are NOT ANYMORE walls in the schools and SO the safe place is ALSO the internet!

.

Related links, learn more:

 

.

Online Safety Redefined

Click the above image, please, to access the article.

 

.

WHY CyberSecurity Starts At Home

Click the above image, please, to access the article.

 

Learn more:

 


 Cybercrime

 

cybercrime-$400 billion-2013

 

.

Learn more:

.


Wearables, Watchables, Internet of Things, Internet of Everything

 

Wearables-CyberSecurity-2015

Click the above image, please, to access the article.

 

.

 

InternetofThings means Internet of Threats-2015

Click the above image, please, to access the article.

 

Learn more:

.

Personal Data-cisco-IoT

 

.

.

After having read this and YOU are STILL NOT convinced about THE MUST of LEARNing the basics of CyberSecurity and Digital CitizenShip, YOU SHOULD ask YOURSELVES if YOU are on the ===> NAIVETY STATUS <=== OR already on the ===> MATURITY STATUS <===, thus meaning if YOU take YOUR RESPONSIBILITY for the future of OUR kids 😉

This implies ALSO to OUR way of THINKing about the technology and ICT, WE MUST develop a sense of Awareness for CyberSecurity and Privacy! ===> LEARNing-To-LEARN <===

« Good habits formed at youth make all the difference. » Aristotle

YOU are STILL feeling YOUNG, aren’t YOU 😉

.

 

First Steps When Kids Go Online

Click the above image, please, to access the article.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Keywords necessary for me to create this blog post: RESPONSIBILITY, what is the internet?, comparison Virtual World and Real World, highway, Internet of Things, Internet of Everything, Social Media, PracTICE, Learning to learn digital citizenship, CyberAttacks interactive maps, REALITY,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 7, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital CitizenShip, Education, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, Facebook, Free courses, FREE-courses, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Synthesizing Mind, Third Party Applications, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

.

We are ALL responsible for the internet

 

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

sharing-iconWE can’t say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility! Actions of some people can easily affect everyone else, thus meaning: WHEN NOT having installed protection software (updated antivirus) YOUR computer and/or smartphone(s) could get infected by malware and YOU will infect ALSO OTHERS who are in contact with YOU; it will become epidemic!

.

WHY CyberSecurity Starts At Home

 Click the above image to access the article, please.

.

Guidelines for securing your home

 Click the above image to access the article, please.

.

Learn more about the “Internet of Things“:

 

 


How To Take OUR Responsibility!? Let’s make CyberHygiene!

Well, that’s actually NOT that difficult, it’s ONLY the first steps who could be unusual and WE need to get used to it. BUT that’s the same with any other first time, isn’t it 😉

========> WE call it CyberHygiene. <=========

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.

SO, let’s go for it, check below please:

.

Top 5 Questions	Parents	Have	About	Cybersecurity

Click the above image to access the article, please.


Global Impact Of CyberSecurity

Let us have a look ALSO about WHAT the EU and the US are saying about CyberSecurity, so that YOU know about the IMPORTANCE, check below, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.


THE HowTo For BEST Protection

programmerman-animatedPlease find below the BEST possible protection as well as tips for individuals (for companies there would be much more…) explained step by step with a minimum use of technical language so that YOU might be able to understand it and to use it comfortable:

.

.

 1.What are the biggest security threats to kids?

1.What are the biggest security threats to kids?

Learn more about: 1.What are the biggest security threats to kids?


2. How do I talk with my child about security?

2. How do I talk with my child about security?

Learn more: 2. How do I talk with my child about security?

  • to be updated… Will get discussed in detail in my new blog post…

3. How do we protect our family’s computers?

3. How do we protect our family's computers?

Learn more: 3. How do we protect our family’s computers?


4. How do we protect our mobile devices?

4. How do we protect our mobile devices?

Learn more: 4. How do we protect our mobile devices?


 5. Why do we always hear “Never share your passwords”?

5. Why do we always hear "Never share your passwords"?

Learn more: 5. Why do we always hear “Never share your passwords”?


AND Don’t Forget About Privacy!

You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.

Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.

.

Bitdefender Clueful

.

Learn more in my blog post: ===> Digital CitizenShip: Social Media AND Privacy <===

 

.

book-question-markLearn more:

.

.

Keywords necessary for me to create this blog post: #FSCD promoted by EDU as Homework, ideas, Social Media, twitter, Facebook, CyberHygiene, reflexes, digital citizenship, digcit, eSkills,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

 
8 Comments

Posted by on November 18, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Europe, Facebook, FAQ, FBI, For a Better World, Free courses, FREE-courses, Future Work Skills, Global, Home-Work, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How To Teach Kids Up From The Early Age About Cyber Security And Digital CitizenShip

How To Teach Kids Up From The Early Age About Cyber Security And Digital CitizenShip

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

First Steps When Kids Go Online

programmerman-animatedThe first steps before the kids go online are to protect the computer and Smartphone(s) at its BEST as possible to make sure that a BAD click will NOT become a catastrophe! Second step is to talk to the kids about the dangers of the internet and related with the use of the computer and the tablets, Smartphones and about the dangers of Social Media.

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.


How To Protect The Home Network AND The Computers In This Network!?

YES, YOU have read it correctly, I mentioned “Network”. WHY!? Because just letting everybody owning ONLY his (her) own device at home wouldn’t make sense, BETTER is to connect ALL the devices (Smartphones, tablets…) together in a Network where YOU could share even together your files, photos, videos… AND this through a secured Network. Everybody will get his OWN “User Account” where one “User Account” will be the “Administrator Account“, the parents account, who will have 100% access on the main computer. ALL the others will have an “User Account” with restricted access. Check out below on the How-To create “User Accounts”.

.Windows User Accounts

 Click the above image to view the video on the How-To, please.

 

Learn more:

.

Windows sharing over network

 Click the above image to access the articles, please.

.

YOU may ALSO change the Wi-Fi Password 2-3 times a week on YOUR router so that YOUR kids get ONLY access after THEY made certain tasks which YOU told THEM to achieve 😉 Thus meaning, YOU handle over the NEW Password ONLY when those tasks were achieved!

Change your Router’s Pass Word!

help-books-aj.svgajash01-1

Cybercriminals may also use your Router (without that you know it…) when you haven’t changed the original settings! Text from Internet / Network Security

.

===> The first step in securing your wireless network is the same as the first step for just about everything else in computers and computer networking — always change the defaults. Any attacker can find out what the default username and password is for a given program or device in just a few minutes. <===

 

SO, NOW YOU got a protected Network and the family members are in a technical secured home environment, what else to do!?

For whatever device (computer, tablet, Smartphone…) and/or OS (Operating System/Mac, Linux, Windows) YOUR family members own, YOU MUST install an antivirus on them. I recommend to use an “Internet Security Suite” which combines antivirus, firewall, antispyware and… Read more below what else to do…

Check the test results below, please:

.


Learn in one week how to get Best protection-The Practice

.

programmerman-animatedI will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…

.

.

Day of the Week Web Address of Blog  Task  Necessary time
Monday Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious!
“WOT” ALONE isn’t enough! My experience over years 😉
Windows + Mac5 minutes per program ONLY!
Tuesday Check if your browsers and its plugins are updated! Why should I?

Windows + Mac

5 minutes per browser ONLY!

Wednesday

 

Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.

Windows

Few minutes ONLY for both programs!

Thursday Install Security Score which helps you to know if you made ALL the necessary updates…

Windows

5 minutes ONLY!

Friday Check any Friday if you got the latest updates! 10-15 minutes ONLY!
Saturday It’s Disk Encryption time: you need to install this software only once, so it’s ONLY a one time action!

Install an Encryption Software, I suggest the OpenSource Tool

 

Windows + Mac + LinuxSeveral hours…

.


.Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!

.

As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉

.

For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:

.

Encryption-SecurityScore-before-after

.


Let Us ALSO Protect OUR Privacy

Are YOU aware of the dangers of WiFi on public places? YOU should!

.
wifi-hotspotProtect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
.
Follow this BBC investigation and be surprised:
.

.

.

And NOT TO FORGET the Apps: Do YOU know WHICH permissions YOU gave YOUR ? Do YOU know HOW MUCH YOU share without knowing? Check below, please and WONDER:

By knowing NOW about the dangers and PRIVACY I suggest that YOU install a “VPN” (Virtual Private Network) application on each browser (Mozilla Firefox, Google Chrome, Safari, Opera, IE…) that YOU use, here below my selection (non-exhaustive list).

 

Internet of things!!!! Smart TVs…

Guidelines for securing your homeClick the above image to access the article, please.

.

Learn more about the “Internet of Things“:

.


WHAT’s The Appropriate Age For Kids To Start With It AND How-To?

.

« Good habits formed at youth make all the difference. » Aristotle

.

programmerman-animatedWHAT’S THE appropriate age for kids to start learning about InternetSafety and CyberSecurity? A question I get asked very often. Well, let us say it this way: when kids understand what is BAD and GOOD, that will be the perfect timing to start to teach them about the dangers of the internet and how to get the right reflexes. YES, reflexes they can learn them easily, NO Technic of course as they wouldn’t understand it! Experts say that the right age would be 5 years old, check the link below, please:

Personally I started to teach my wife’s niece 12 years ago when she was 4 1/2 year old and that worked perfectly. I will tell YOU how I did and YOU can try it out as well, success guaranteed.

First of all ask the kid if it knows about the BAD and the GOOD in our real world and tell it that on the internet (virtual world) it is the same. Tell them that the BAD guys will infect the computer, explain them that it is similar to an infection in real world (flu, as example…). For that reason they need a protection on the computer which will get updated, that’s the vaccine. When they know about vaccine in real world, they will understand that it is a MUST!

Parents should have taught them this about vaccines! WE will remember them each day (or at any time they go online) when getting online with the computer to check if the antivirus is switched on, they will get ===> THE reflex <=== later to check about THAT action. It is actually very easy, I will explain below.

.

antivirus in taskbar

As YOU can see on left-hand side the antivirus, in our case “Norton Internet Security Suite” is visible (see red circle). WE see as well that there is a green checkmark. This checkmark shows us that the antivirus is switched on and updated. Tell the kids up from early age to check this every time they use the computer, they will remember it.

Install ALSO WOT and McAfee SiteAdvisor on any devices as both show what websites to trust by indicating it with three different colours (green, orange, red). The kids will recognize the colours and understand.

.

McAfee SiteAdvisor

.

With the above mentioned advice your kids will learn the necessary basic reflexes to stay safe on the internet. BUT DON’T FORGET: a security by 100% doesn’t exist and the weakest link in the security chain is the human!

Learn more (my articles in the press):

.


Parents Cybersecurity And InternetSafety Knowledge And Skills, A MUST!

I created a special blog post about it, please check below:

 


Are There Already Existing Examples?

.

 

Online Safety Redefined

 

To access the article, please click the above image.

Europe, UK…

.


My Favourite Web Sites For Kids

Please find below my selection of websites (non-exhaustive list) for kids from 0-12 years old:

 


Learning Responsibility: Family Pledge And Passwords

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01Use a psychological trick to remember your family members about the MUST to take care about their weekly CyberHygiene, the reflex to learn, and play the songThe Reflex-Duran Duran”. They will get used to it, and every time they hear the song they would know that there is something special to do, such as NEW “Updates“! Easy to use, isn’t it 😉

.

.

Organize a Family Weekly-Security-Day

Community

My suggestion: to make sure that anybody’s computer is secure at home I suggest that you introduce a “Family Weekly-Security-Day“, where any week one member of your family will get chosen as the  “responsible” for the week and that “responsible” will remind you to respect the weekly task and controls also that the task was achieved! I will provide you with a sheet from Google Docs which you can use for it…

===> Play as a team in the family to make sure that everybody respects the weeklySecurity-Day! Any week someone else is responsible to remember the whole team (family) for the Weekly-Security-Day-Task! <===

Worksheets on Google Docs: 

You can even imagine some penalties such as e.g. making the dish-wash for 2 days, or similar, LOL 😉

.

===> Motivation: don’t let us forget the positive side and motivate members of family to do that unusual task by giving them some special bonus points when well done that task! Those bonus points could result in: <===

.

  • Penalties could get reset for a certain time (up to you to make the rules…)
  • Bonus points will get collected and by reaching a certain score will result by paying out some money (up to you to say how much…)
  • Your own ideas for motivating the team to do the tasks…
.

Create a family pledge where the members have to agree to to respect the family community responsibility. You may ALSO make one member of the family the responsible person for one week who takes care of the others and who will supervise that each member of the family respects the weekly security tasks. A spreadsheet may help, here below an example.

.

Family weekly responsibility spreadsheetClick the above image to access the document.

.

This blog post was featured on “Cyberwise” in March 06, 2015.

Cyberwise-Gust MEES-How To Teach Kids-06-03-2015

Click the above image, please, to access the article

.


 

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Necessary keywords for me to create this blog post: Family pledge: learning responsibility. password ONLY when done some tasks… Password CHANGE ALL 3 months, reflexes, showing the way, remembering the said when growing, asking questions when not comfortable, comfort zone together with parents, workstation NOT in separate room, published articles in the press, responsibility, community feeling, empathy, examples from traffic, the THREE colours (red, green, orange), WOT, McAfee Site Advisor, secure surfing, Antivirus reflex, Wi-Fi password change every day or once a week when tasks are done kids get it 😉 Router configuration for family… Passwords, sending messages over the network (#FSCD), planifying #FSCD over DOODLE, Family Safety, computer in a place who everybody is seeing; NOT in bedroom!, Install VPN on any devices as browser add-on.===> creating different accounts, ONE Administrator the others with restricted…, creating a Home-Network for sharing documents, photos, etc., tutorial from Microsoft about different accounts, links, Privacy settings, WOT, Any Friday #FSCD, family pledge, creating a sense of responsibility, Updates, 3dParty, CyberBullying Avira !!!!!!!!!!!!!!!!!!!!!!!!!! garage appointment for cars, CyberHygiene, creating sense of responsibility,

.

Stay tuned for next blog posts 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Can Education Help To Lower Cybercrime?

How Can Education Help To Lower Cybercrime?

.
Evolution of Education: Wordle Logo
.


.

SID15_Banner_anim

.

How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOODDigital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!

.

« Good habits formed at youth make all the difference. » Aristotle

.

.

.

We are ALL responsible for the internet

 Image credit ===> http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html <===

Here below the main links about WHAT to learn about:

TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!

The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!

 

Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, 

Read below please, for more detailed instructions and information, thanks.

.


THE Facts

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.


Awareness And Naivety, WHAT!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:

.

.

.

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

======> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <======

.

Cyberattacks the greatest threat to nations

A MUST READ:

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:


How To Protect To NOT Become A Zombie!?

programmerman-animatedAs already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:

.

.


TOR And Anonymity!???

.

 

TOR-2014-cybercrime

 

.

Learn more:

It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet! 

.


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

 


WHAT Actions Could Get Taken WHO Are Student Centered?

sharing-iconWHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:

.


 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

.

 

 
7 Comments

Posted by on November 4, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Competency, Connected Educators, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Europe, European Cyber Security Month, Free courses, FREE-courses, Future Work Skills, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Jail, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Updates, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,